Results 41 to 50 of about 2,276 (160)

IoT Networks: Using Machine Learning Algorithm for Service Denial Detection in Constrained Application Protocol

open access: yesCovenant Journal of Engineering Technology, 2023
The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years,
Adamu Abdullahi   +4 more
doaj  

Categorization of CoAP DoS Attack Based on One-Class Boundary Methods [PDF]

open access: bronze, 2023
Míriam Timiraos   +8 more
openalex   +1 more source

IoT and Man‐in‐the‐Middle Attacks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni   +2 more
wiley   +1 more source

Models2Code: Autonomous model‐based generation to expedite the engineering process

open access: yesSystems Engineering, Volume 28, Issue 2, Page 224-237, March 2025.
Abstract Insufficient resources and high costs are hindering industrial development, potentially impeding adaptation to market demands. Overcoming this challenge necessitates advancements in software engineering techniques to streamline processes and meet industrial requirements. Crucially, automating manual tasks and enhancing interoperability between
Cristina Paniagua, Fernando Labra Caso
wiley   +1 more source

A Thorough Review of Security in Information‐Centric Networking

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The rapid evolution of technology has revealed the limitations of host‐centric or IP address–based networks. To overcome these limitations, a new communication paradigm has emerged: the information‐centric networking (ICN), which focuses on content (data) regardless of its location in the network.
Ado Adamou Abba Ari   +7 more
wiley   +1 more source

Intraoperative cardiac function assessment by transesophageal echocardiography versus FloTrac/Vigileo™ system during pectus excavatum surgical repair

open access: yesJournal of Anesthesia, Analgesia and Critical Care, 2021
Background Pectus excavatum (PE), a congenital deformity of the chest wall, can lead to cardiac compression and related symptoms. PE surgical repair can improve cardiac function. Intraoperative transesophageal echocardiography (TEE) has been successfully
Silvia Fiorelli   +11 more
doaj   +1 more source

A Review on Integrating IoT, IIoT, and Industry 4.0: A Pathway to Smart Manufacturing and Digital Transformation

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The industrial Internet of Things (IIoT) has become an innovative technology that has brought many benefits to industries and organizations. This review presents a comprehensive analysis of IIoT’s applications, highlighting its ability to optimize industrial operations through advanced connectivity, real‐time data exchange, automation, and its ...
Fujun Qiu   +7 more
wiley   +1 more source

Analysis and Application of Evaluation Method on Compressors for Variable Speed Room Air Conditioners

open access: yesZhileng xuebao, 2013
The efficiency requirement of room air conditioner (RAC) has became stricter and stricter with the development of global environment consciousness.
Zhang Haifeng, Wu Jianhua, Li Yanzhong
doaj  

Variance‐driven security optimisation in industrial IoT sensors

open access: yesIET Networks, Volume 14, Issue 1, January/December 2025.
The methodology employed in this study adopts a systematic approach to deploying machine learning algorithms for the detection of anomalies in industrial sensor data. Data preprocessing, the first step in the process, ensures that the industrial sensor data is cleaned and prepared for subsequent model training.
Hardik Gupta   +7 more
wiley   +1 more source

TinyCoAP: A Novel Constrained Application Protocol (CoAP) Implementation for Embedding RESTful Web Services in Wireless Sensor Networks Based on TinyOS

open access: yesJournal of Sensor and Actuator Networks, 2013
In this paper we present the design and implementation of the Constrained Application Protocol (CoAP) for TinyOS, which we refer to as TinyCoAP. CoAP seeks to apply the same application transfer paradigm and basic features of HTTP to constrained networks,
Anna Calveras   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy